In my last article I talked about my thermostat and the Internet of Everything [read here] I questioned the true value my smart meter was providing to my home and my wallet. I said what's missing is a thermostat that helps me unde...
In this week's episode, Nils Swart (@NLNils) and Stace Hipperson (@stacehipperson) discuss how data becomes information via Open Daylight. Have they whiteboarded network engineer nirvana? Watch and see. More data! This is in fact...
The industry has been buzzing over the past years around Next Generation of Software Defined and Application Centric networks. If you missed that, it means that you were probably on planet ...Zircon (?). In his recent blog, ...
This post is coauthored by Andrew Tsonchev. Anyone can purchase an exploit pack (EP) license or rent time on an existing EP server. The challenge for threat actors is to redirect unsuspecting web browsing victims by force to the e...
Previously I have blogged aboutNo SSID OutageandNo Client Reauthenticationwhereby even if your Cisco Wireless Controllers were to fail due to any reason, the clients will NOT experience any downtime due to Stateful Failover functi...
Today the Internet of Things (IoT) is everywhere: you can easily see smart meters on houses, parking sensors in the ground, cameras attached to traffic posts, and people wearing intelligent wristband and glasses -all of them conne...
This is the first of a four part series on the convergence of IT and OT (Operational Technologies) Part 2will cover the impact of the transition to IP on Physical Security and the convergence of Physical and Cyber Security...
Trying to stay entirely up-to-date on the ways the Internet and data in general are changing is like trying to spot the winner in a horse race where the horses are traveling faster than the speed of light. Everything looks impress...
It is with great pleasure I introduce you to a senior thought-leader from Cisco, Rick Geiger. As some of you will know, Rick Geiger has been with Cisco for 7 years, and was formerly Director of Engineering in Cisco's Physical Secu...
At Cisco, security runs through everything that we do. It is our commitment to deliver verifiable, trustworthy network architectures built on secure software and secure hardware, backed by prudent supply chain security practices. ...
I am writing this blog as the 2014 recipient of the IEEE Women in Engineering Region 8 Clementina Saduwa Award named after an amazing woman whose life was cut short in 2007. On a personal level, I am extremely passionate about the...
As we move ahead in this Internet of Everything era, we're suretosee more connections and integration-and that's why technology professionals have to work to understand the big picture, moving out of IT silos and taking an end-to-...